95 resultados para User Influence, Micro-blogging platform, Action-based Network, Dynamic Model


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper investigates the robust tracking control problem for a bipolar electromagnetic-levitation precise-position system. The dynamic model of the precise-position device is derived by conducting a thorough analysis on the nonlinear electromagnetic forces. Conventional sliding-mode control and terminal sliding-mode control strategies are developed to guarantee asymptotic and finite-time tracking capabilities of the closed-loop system. A lumped uncertainty estimator is proposed to estimate the system uncertainties. The estimated information is then used to construct a smooth uniformly ultimately bounded sliding-mode control. An exact estimator is also proposed to exactly estimate the unknown uncertainties in finite time. The output of the exact estimator is used to design a continuous chattering free terminal sliding-mode control. The time taken for the closed-loop system to reach zero tracking error is proven to be finite. Experiment results are presented, using a real time digital-signal-processor (DSP) based electromagnetic-levitation system to validate the analysis.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

One of the drawbacks of LEACH protocol is the uncontrolled selection of cluster heads which, in some rounds, leads to the concentration of them in a limited area due to the randomness of the selection procedure. LEACH-C is a variant of LEACH that uses a centralized clustering algorithm and forms good clusters through sink control. According to experimental results, the IEEE 802.15.4 packets are damaged by WLAN interferences in ISM band. It seems that, sensor nodes equipped with cognitive radio capabilities can overcome this problem. In cognitive radio sensor networks (CRSN), routing must be accompanied by channel allocation. This requires spectrum management which can be devolved to cluster heads. For this networks, new duty cycle mechanisms must be designed that jointly consider neighbor discovery, and spectrum sensing/allocation. Cluster-based network architecture is a good choice for effective dynamic spectrum management. In such architecture, cluster heads have a proper spatial distribution and are optimally located all over the network. In this paper, using the physical layer information and preserving the feature of random cluster head selection in LEACH, it has been tried to both move the position of cluster heads to appropriate locations and make their quantity optimal. The simulation results show that the transferal of cluster heads to appropriate locations increases the network lifetime significantly though this comes at the price of early instability appearance. By considering the energy level in cluster head election algorithm, one can overcome the network stability issues too. However, this will move the cluster heads away from their appropriate locations. © 2012 IEEE.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background
Worldwide, type 2 diabetes (T2DM) prevalence has more than doubled over two decades. In Australia, diabetes is the second highest contributor to the burden of disease. Lifestyle modification programs comprising diet changes, weight loss and moderate physical activity, have been proven to reduce the incidence of T2DM in high risk individuals.

As part of the Council of Australia Governments, the State of Victoria committed to develop and support the diabetes prevention program ‘Life! Taking action on diabetes’ (Life!) which has direct lineage from effective clinical and implementation trials from Finland and Australia. The Melbourne Diabetes Prevention Study (MDPS) has been set up to evaluate the effectiveness and cost-effectiveness of a specific version of the Life! program.

Methods/design
We intend to recruit 796 participants for this open randomized clinical trial; 398 will be allocated to the intervention arm and 398 to the usual care arm. Several methods of recruitment will be used in order to maximize the number of participants. Individuals aged 50 to 75 years will be screened with a risk tool (AUSDRISK) to detect those at high risk of developing T2DM. Those with existing diabetes will be excluded. Intervention participants will undergo anthropometric and laboratory tests, and comprehensive surveys at baseline, following the fourth group session (approximately three months after the commencement of the intervention) and 12 months after commencement of the intervention, while control participants will undergo testing at baseline and 12 months only.

The intervention consists of an initial individual session followed by a series of five structured-group sessions. The first four group sessions will be carried out at two week intervals and the fifth session will occur eight months after the first group session. The intervention is based on the Health Action Process Approach (HAPA) model and sessions will empower and enable the participants to follow the five goals of the Life! program.

Discussion

This study will determine whether the effect of this intervention is larger than the effect of usual care in reducing central obesity and cardiovascular risk factors and thus the risk of developing diabetes and cardiovascular disease. Also it will evaluate how these two options compare economically.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Law schools should use social media websites such as Twitter and Facebook, and blogs to strengthen ties with students and keep them more engaged with their studies, argues an Australian academic research paper.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Text clustering can be considered as a four step process consisting of feature extraction, text representation, document clustering and cluster interpretation. Most text clustering models consider text as an unordered collection of words. However the semantics of text would be better captured if word sequences are taken into account.

In this paper we propose a sequence based text clustering model where four novel sequence based components are introduced in each of the four steps in the text clustering process.

Experiments conducted on the Reuters dataset and Sydney Morning Herald (SMH) news archives demonstrate the advantage of the proposed sequence based model, in terms of capturing context with semantics, accuracy and speed, compared to clustering of documents based on single words and n-gram based models.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Legal academics are not only teachers but also creators of knowledge. The role of an academic includes a responsibility to share this knowledge through engagement not just of their students, but also of the wider community. In addition, there is increasing emphasis on legal academics having to account for the so-called ‘impact’ of research. In selecting both the topic of their research and the mode of publication of their knowledge, legal academics act as gatekeepers. There is an increasing critique of the existing paradigm of research publication and its emphasis on the metrics of impact. This critique recognises the limitations of the commercial publication paradigm in the present context of open access and the vast array of citizen-mediated platforms for dissemination of legal knowledge and innovation. Susskind (Tomorrow’s Lawyers 2013) for example identifies expert crowd-sourced legal information as breaking down barriers to access to justice. Tracking their experience with publication of a paper on social media in legal education from the ALTA conference in 2012, the authors share an auto-ethnographic account of their insights into the potential for both impact and engagement of a diverse audience in their research. This highlights the ways in which various media can be used strategically to redefine the role of the gatekeeper.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Certificate-based encryption was introduced in Eurocrypt’03 to solve the certificate management problem in public key encryption. Recently, this idea has been extended to certificate-based signatures. To date, several new schemes and security models of certificate-based signatures have been proposed. In this paper, we first introduce a new security model of certificate-based signatures. Our model is not only more elaborated when compared with the existing ones, but also defines several new types of adversaries in certificate-based signatures. We then investigate the relationship between certificate-based signatures and certificateless signatures, by proposing a generic construction of certificate-based signatures from certificateless signatures. Our generic construction is secure (in the random oracle model) under the security model defined in this paper, assuming the underlying certificateless signatures satisfying certain security notions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and Markowitch in 2003 and revisited by Laguil- laumie and Vergnaud in 2004. In this paper, we firstly propose the notion of short strong designated verifier sig- nature scheme, and extend it to the short identity-based strong designated verifier scheme. Then, we propose the first construction of short strong designated verifier sig- nature scheme. We also extend our scheme to construct a short identity-based strong designated verifier signature scheme. The size of the signature of our schemes is the shortest compared to any existing schemes reported in the literature. We provide formal security proofs for our schemes based on the random oracle model. Finally, we also discuss an extension of our scheme to construct a short strong designated verifier signature without random oracle.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Wireless ad hoc networks, especially in the hostile environment, are vulnerable to traffic analysis which allows the adversary to trace the routing messages and the sensitive data packets. Anonymity mechanism in ad hoc networks is a critical securing measure method employed to mitigate these problems. In this paper, we propose a novel secure and anonymous source routing protocol, called SADSR, based on Dynamic Source Routing (DSR) for wireless ad hoc networks. In the proposed scheme, we use the pseudonym, pseudonym based cryptography and the bloom filter to establish secure and anonymous routing in wireless ad hoc networks. Compared to other anonymous routing protocol, SADSR is not only anonymous but also the secure in the routing discover process and data transmission process.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Development of a digital material representation (DMR) model of dual phase steel is presented within the paper. Subsequent stages involving generation of a reliable representation of microstructure morphology, assignment of material properties to component phases and incorporation of the model into the commercial finite element software are described within the paper. Different approaches used to recreate dual phase morphology in a digital manner are critically assessed. However, particular attention is placed on innovative identification of phase properties at the micro scale by using micro-pillar compression tests. The developed DMR model is finally applied to model influence of micro scale features on failure initiation and propagation under loading conditions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Adolescent alcohol use remains an important public health concern. One of the most salient and consistent predictors for drinking behaviour among young people is peer influence. A systematic review of longitudinal studies that examined the effect of peer influence on adolescent alcohol use between January 1997 and February 2011 is presented. Twenty-two studies fulfilled inclusion criteria and were reviewed. All but one study confirmed affiliation with alcohol-using or deviant peers as prospective predictors for the development of adolescent alcohol use. Findings revealed that existing longitudinal studies that have used multivariate analytic techniques to segregate peer influence (whereby adolescents start drinking after exposure to alcohol-using friends) and peer selection (whereby adolescents that start drinking without alcohol-using friends subsequently seek out drinking peers) effects consistently report significant peer influence effects. However, studies are unable to elucidate the relative contribution and developmental sequence of peer influence and selection. Existing research is synthesised to model the developmental influence of peer processes on adolescent alcohol use. Future research directions are recommended to inform better designed investigations that can lead to more effective endeavours to address peer processes in prevention efforts.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As online business activities continue to grow, it is important for organizations to understand the implications of being an e-commerce organization and the appropriateness of applying existing business techniques to e-commerce organizations. This paper examines issues in managing information and communication technologies (ICT) costs in e-commerce organizations and the potentials of the Time-Driven Activity-Based Costing (TDABC) model as a solution to these issues. The reliance on ICT in value creation, the unique natures of ICT costs and the need to maintain updated costing models present new challenges to e-commerce organizations in management of ICT costs. The TDABC model, as a variant of the Activity-Based Costing (ABC) model, inherits the strengths of activity-based paradigm and has unique features that can provide additional benefits to e-commerce organizations.